General
-
Target
d980abe9f8e702a47b8716f45d36519d0250dd7e42620802b3922e8937947532
-
Size
387KB
-
Sample
221127-r7pjxaeg78
-
MD5
c44a6b41984315bbcb7696bcc63d9904
-
SHA1
f54d26501e363cf68f610063ece658aa618f419f
-
SHA256
d980abe9f8e702a47b8716f45d36519d0250dd7e42620802b3922e8937947532
-
SHA512
4edaed3a160ca025623d177fd39fe2c44507b11adb7f15f669478b8887343fd1307751e6438a017d6f8a0337db803f4fc434ed7b298242fdbe201cd851ae313e
-
SSDEEP
12288:NpwL2ukoEOC/8ktGSsesW2jgSi0VAMVsL4EfTjC66:NpwLNkECEktGSns9gTMVruTjn6
Static task
static1
Behavioral task
behavioral1
Sample
Shipment doc.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
Shipment doc.exe
Resource
win10v2004-20221111-en
Malware Config
Targets
-
-
Target
Shipment doc.exe
-
Size
431KB
-
MD5
7267866e61ab496ef241adb843643536
-
SHA1
63ab40146c9f186b0c6a20b623f25f8eb58b6173
-
SHA256
3ab5088c86cf977cb96bfb1616f8f9ec791d6e3356e346364f4255370973f5d0
-
SHA512
74521abfe1f7bf286a7873e61b4e104b1f2923678dbda82e90e7e3c8abf9f61dfe200de88ac75f7bb99d9b095deb98fc7aa89210c90469b36ed38cf8f49bb104
-
SSDEEP
12288:M5yqoY2ukkEOG/8k3GSmksW2FgSiKVAEVsL4EfBj:6Nk4GEk3GSFsDgpEVruBj
Score10/10-
ISR Stealer
ISR Stealer is a modified version of Hackhound Stealer written in visual basic.
-
ISR Stealer payload
-
NirSoft MailPassView
Password recovery tool for various email clients
-
Nirsoft
-
Accesses Microsoft Outlook accounts
-
Suspicious use of SetThreadContext
-